mirror of git://anongit.mindrot.org/openssh.git
- (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
Known issue: Blowfish for SSH1 does not work
This commit is contained in:
parent
ff8f94c3e6
commit
c7375ac466
|
@ -1,6 +1,8 @@
|
||||||
20020308
|
20020308
|
||||||
- (djm) Revert bits of Markus' OpenSSL compat patch which was accidentally
|
- (djm) Revert bits of Markus' OpenSSL compat patch which was
|
||||||
committed.
|
accidentally committed.
|
||||||
|
- (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
|
||||||
|
Known issue: Blowfish for SSH1 does not work
|
||||||
|
|
||||||
20020307
|
20020307
|
||||||
- (djm) OpenBSD CVS Sync
|
- (djm) OpenBSD CVS Sync
|
||||||
|
@ -7824,4 +7826,4 @@
|
||||||
- Wrote replacements for strlcpy and mkdtemp
|
- Wrote replacements for strlcpy and mkdtemp
|
||||||
- Released 1.0pre1
|
- Released 1.0pre1
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.1917 2002/03/10 23:48:53 djm Exp $
|
$Id: ChangeLog,v 1.1918 2002/03/10 23:51:17 djm Exp $
|
||||||
|
|
43
cipher.c
43
cipher.c
|
@ -44,6 +44,11 @@ RCSID("$OpenBSD: cipher.c,v 1.52 2002/02/18 13:05:32 markus Exp $");
|
||||||
#include <openssl/md5.h>
|
#include <openssl/md5.h>
|
||||||
#include "rijndael.h"
|
#include "rijndael.h"
|
||||||
|
|
||||||
|
#if OPENSSL_VERSION_NUMBER < 0x00906000L
|
||||||
|
#define SSH_OLD_EVP
|
||||||
|
#define EVP_CIPHER_CTX_get_app_data(e) ((e)->app_data)
|
||||||
|
#endif
|
||||||
|
|
||||||
static EVP_CIPHER *evp_ssh1_3des(void);
|
static EVP_CIPHER *evp_ssh1_3des(void);
|
||||||
static EVP_CIPHER *evp_ssh1_bf(void);
|
static EVP_CIPHER *evp_ssh1_bf(void);
|
||||||
static EVP_CIPHER *evp_rijndael(void);
|
static EVP_CIPHER *evp_rijndael(void);
|
||||||
|
@ -171,7 +176,11 @@ cipher_init(CipherContext *cc, Cipher *cipher,
|
||||||
int encrypt)
|
int encrypt)
|
||||||
{
|
{
|
||||||
static int dowarn = 1;
|
static int dowarn = 1;
|
||||||
|
#ifdef SSH_OLD_EVP
|
||||||
|
EVP_CIPHER *type;
|
||||||
|
#else
|
||||||
const EVP_CIPHER *type;
|
const EVP_CIPHER *type;
|
||||||
|
#endif
|
||||||
int klen;
|
int klen;
|
||||||
|
|
||||||
if (cipher->number == SSH_CIPHER_DES) {
|
if (cipher->number == SSH_CIPHER_DES) {
|
||||||
|
@ -196,6 +205,15 @@ cipher_init(CipherContext *cc, Cipher *cipher,
|
||||||
type = (*cipher->evptype)();
|
type = (*cipher->evptype)();
|
||||||
|
|
||||||
EVP_CIPHER_CTX_init(&cc->evp);
|
EVP_CIPHER_CTX_init(&cc->evp);
|
||||||
|
#ifdef SSH_OLD_EVP
|
||||||
|
if (type->key_len > 0 && type->key_len != keylen) {
|
||||||
|
debug("cipher_init: set keylen (%d -> %d)",
|
||||||
|
type->key_len, keylen);
|
||||||
|
type->key_len = keylen;
|
||||||
|
}
|
||||||
|
EVP_CipherInit(&cc->evp, type, (u_char *)key, (u_char *)iv,
|
||||||
|
(encrypt == CIPHER_ENCRYPT));
|
||||||
|
#else
|
||||||
if (EVP_CipherInit(&cc->evp, type, NULL, (u_char *)iv,
|
if (EVP_CipherInit(&cc->evp, type, NULL, (u_char *)iv,
|
||||||
(encrypt == CIPHER_ENCRYPT)) == 0)
|
(encrypt == CIPHER_ENCRYPT)) == 0)
|
||||||
fatal("cipher_init: EVP_CipherInit failed for %s",
|
fatal("cipher_init: EVP_CipherInit failed for %s",
|
||||||
|
@ -210,6 +228,7 @@ cipher_init(CipherContext *cc, Cipher *cipher,
|
||||||
if (EVP_CipherInit(&cc->evp, NULL, (u_char *)key, NULL, -1) == 0)
|
if (EVP_CipherInit(&cc->evp, NULL, (u_char *)key, NULL, -1) == 0)
|
||||||
fatal("cipher_init: EVP_CipherInit: set key failed for %s",
|
fatal("cipher_init: EVP_CipherInit: set key failed for %s",
|
||||||
cipher->name);
|
cipher->name);
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
void
|
void
|
||||||
|
@ -217,15 +236,23 @@ cipher_crypt(CipherContext *cc, u_char *dest, const u_char *src, u_int len)
|
||||||
{
|
{
|
||||||
if (len % cc->cipher->block_size)
|
if (len % cc->cipher->block_size)
|
||||||
fatal("cipher_encrypt: bad plaintext length %d", len);
|
fatal("cipher_encrypt: bad plaintext length %d", len);
|
||||||
|
#ifdef SSH_OLD_EVP
|
||||||
|
EVP_Cipher(&cc->evp, dest, (u_char *)src, len);
|
||||||
|
#else
|
||||||
if (EVP_Cipher(&cc->evp, dest, (u_char *)src, len) == 0)
|
if (EVP_Cipher(&cc->evp, dest, (u_char *)src, len) == 0)
|
||||||
fatal("evp_crypt: EVP_Cipher failed");
|
fatal("evp_crypt: EVP_Cipher failed");
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
void
|
void
|
||||||
cipher_cleanup(CipherContext *cc)
|
cipher_cleanup(CipherContext *cc)
|
||||||
{
|
{
|
||||||
|
#ifdef SSH_OLD_EVP
|
||||||
|
EVP_CIPHER_CTX_cleanup(&cc->evp);
|
||||||
|
#else
|
||||||
if (EVP_CIPHER_CTX_cleanup(&cc->evp) == 0)
|
if (EVP_CIPHER_CTX_cleanup(&cc->evp) == 0)
|
||||||
error("cipher_cleanup: EVP_CIPHER_CTX_cleanup failed");
|
error("cipher_cleanup: EVP_CIPHER_CTX_cleanup failed");
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@ -296,6 +323,11 @@ ssh1_3des_init(EVP_CIPHER_CTX *ctx, const u_char *key, const u_char *iv,
|
||||||
EVP_CIPHER_CTX_init(&c->k1);
|
EVP_CIPHER_CTX_init(&c->k1);
|
||||||
EVP_CIPHER_CTX_init(&c->k2);
|
EVP_CIPHER_CTX_init(&c->k2);
|
||||||
EVP_CIPHER_CTX_init(&c->k3);
|
EVP_CIPHER_CTX_init(&c->k3);
|
||||||
|
#ifdef SSH_OLD_EVP
|
||||||
|
EVP_CipherInit(&c->k1, EVP_des_cbc(), k1, NULL, enc);
|
||||||
|
EVP_CipherInit(&c->k2, EVP_des_cbc(), k2, NULL, !enc);
|
||||||
|
EVP_CipherInit(&c->k3, EVP_des_cbc(), k3, NULL, enc);
|
||||||
|
#else
|
||||||
if (EVP_CipherInit(&c->k1, EVP_des_cbc(), k1, NULL, enc) == 0 ||
|
if (EVP_CipherInit(&c->k1, EVP_des_cbc(), k1, NULL, enc) == 0 ||
|
||||||
EVP_CipherInit(&c->k2, EVP_des_cbc(), k2, NULL, !enc) == 0 ||
|
EVP_CipherInit(&c->k2, EVP_des_cbc(), k2, NULL, !enc) == 0 ||
|
||||||
EVP_CipherInit(&c->k3, EVP_des_cbc(), k3, NULL, enc) == 0) {
|
EVP_CipherInit(&c->k3, EVP_des_cbc(), k3, NULL, enc) == 0) {
|
||||||
|
@ -304,6 +336,7 @@ ssh1_3des_init(EVP_CIPHER_CTX *ctx, const u_char *key, const u_char *iv,
|
||||||
EVP_CIPHER_CTX_set_app_data(ctx, NULL);
|
EVP_CIPHER_CTX_set_app_data(ctx, NULL);
|
||||||
return (0);
|
return (0);
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
return (1);
|
return (1);
|
||||||
}
|
}
|
||||||
static int
|
static int
|
||||||
|
@ -315,10 +348,16 @@ ssh1_3des_cbc(EVP_CIPHER_CTX *ctx, u_char *dest, const u_char *src, u_int len)
|
||||||
error("ssh1_3des_cbc: no context");
|
error("ssh1_3des_cbc: no context");
|
||||||
return (0);
|
return (0);
|
||||||
}
|
}
|
||||||
|
#ifdef SSH_OLD_EVP
|
||||||
|
EVP_Cipher(&c->k1, dest, (u_char *)src, len);
|
||||||
|
EVP_Cipher(&c->k2, dest, dest, len);
|
||||||
|
EVP_Cipher(&c->k3, dest, dest, len);
|
||||||
|
#else
|
||||||
if (EVP_Cipher(&c->k1, dest, (u_char *)src, len) == 0 ||
|
if (EVP_Cipher(&c->k1, dest, (u_char *)src, len) == 0 ||
|
||||||
EVP_Cipher(&c->k2, dest, dest, len) == 0 ||
|
EVP_Cipher(&c->k2, dest, dest, len) == 0 ||
|
||||||
EVP_Cipher(&c->k3, dest, dest, len) == 0)
|
EVP_Cipher(&c->k3, dest, dest, len) == 0)
|
||||||
return (0);
|
return (0);
|
||||||
|
#endif
|
||||||
return (1);
|
return (1);
|
||||||
}
|
}
|
||||||
static int
|
static int
|
||||||
|
@ -346,7 +385,9 @@ evp_ssh1_3des(void)
|
||||||
ssh1_3des.init = ssh1_3des_init;
|
ssh1_3des.init = ssh1_3des_init;
|
||||||
ssh1_3des.cleanup = ssh1_3des_cleanup;
|
ssh1_3des.cleanup = ssh1_3des_cleanup;
|
||||||
ssh1_3des.do_cipher = ssh1_3des_cbc;
|
ssh1_3des.do_cipher = ssh1_3des_cbc;
|
||||||
|
#ifndef SSH_OLD_EVP
|
||||||
ssh1_3des.flags = EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH;
|
ssh1_3des.flags = EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH;
|
||||||
|
#endif
|
||||||
return (&ssh1_3des);
|
return (&ssh1_3des);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -494,7 +535,9 @@ evp_rijndael(void)
|
||||||
rijndal_cbc.init = ssh_rijndael_init;
|
rijndal_cbc.init = ssh_rijndael_init;
|
||||||
rijndal_cbc.cleanup = ssh_rijndael_cleanup;
|
rijndal_cbc.cleanup = ssh_rijndael_cleanup;
|
||||||
rijndal_cbc.do_cipher = ssh_rijndael_cbc;
|
rijndal_cbc.do_cipher = ssh_rijndael_cbc;
|
||||||
|
#ifndef SSH_OLD_EVP
|
||||||
rijndal_cbc.flags = EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH |
|
rijndal_cbc.flags = EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH |
|
||||||
EVP_CIPH_ALWAYS_CALL_INIT;
|
EVP_CIPH_ALWAYS_CALL_INIT;
|
||||||
|
#endif
|
||||||
return (&rijndal_cbc);
|
return (&rijndal_cbc);
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue